Infosecurity Opinions
It’s Time to Stop Accepting Losses in Cybersecurity
John Kindervag argues that we should shift from risk management to danger management in cybersecurity
Rethinking Resilience for the Age of AI-Driven Cybercrime
Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility
Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths
Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age
Challenges Facing the UK Government’s Proposed Ransomware Ban
Andrew Rose discusses issues and pitfalls around the UK government's proposed ransomware payment ban
How Security Professionals Can Prepare for the CISO Role
ISACA's Sushila Nair explains the different skills security professionals need to learn during their careers to prepare for leadership positions
Preparing for the Realities of a Ransomware Confrontation
Raj Samani advises on how to prepare for the reality of facing a ransomware demand
Combating the Invisible Threat of In-Memory Cyber-Attacks
Brad LaPorte discusses the growing trend of in memory, runtime-based attacks, which are exceptionally difficult for defenders to detect
From Legacy Systems to 5G: Enterprise Security Threats in 2025
The GSMA's Sam Knight sets out the ways attackers are targeting expanding attack surfaces
Incident Management: How to Ensure Your Organization Can Handle a Crisis
TD Bank's Gaya Ratnam discusses how organizations can improve their incident management amid surging cyber attacks
Zero Trust Must be a Cybersecurity Priority for the Trump Administration
To safeguard US systems against threat actors like Salt Typhoon, Trump Should Double Down on Biden’s Zero Trust Initiatives
Third-Party Cyber Risk Management: Taking a Strategic Approach
Travelers' Jaime Palumbo discusses the third-party cyber risk landscape, and actions organizations need to take to address this threat
Full Exposure: A Practical Approach to Handling Sensitive Data Leaks
GitHub's CISO Alexis Wales argues that organizations should embrace the assumption of full exposure when responding to accidental data leaks
Data Privacy Week: What Apple’s Wiretap Settlement Means for the Future of Privacy
Polina Arsentyeva discusses the impact of Apple’s recently settled lawsuit relating to Siri recordings on consumer privacy
Data Privacy Week: How Privacy Pros Are Navigating the Gordian Knot of Digital Law
IAPP experts discuss how privacy professionals are meeting the challenge of navigating expanding and overlapping digital law and policy
Data Privacy Week: EU Commission Data Transfer Case Has Implications for US Businesses
Victoria Akosile says US firms that transfer data from the EU need to take notice of a recent Court ruling over EU Commission practices
Quantum Computers Are Coming for Your Crypto Keys, But Not Yet
IBS Software’s Alex Haynes says there is still a long way to go before quantum computers are able to break modern cryptographic keys
Learning from 2024: An Unprecedented Exploitation of Remote Access Technologies
Paolo Passeri discusses the unprecedented number of exploitation of remote access technologies in 2024, and how organizations can boost their security against such incidents
Top CISO Focuses for Navigating Cybersecurity in 2025
PA Consulting experts say that data governance and securing AI should be among the key focuses for CISOs in 2025
2025: A Critical Year for Cybersecurity Compliance in the EU and UK
Lawyers from Clifford Chance highlight the cybersecurity legislative updates in 2024 that EU and UK businesses must be prepared for
2025 to be a Year of Reckoning for AI in Cybersecurity
Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the technology